Abstract
The use of interconnected information and communication systems has broadened computer users' vulnerability to cyber-attacks. However, effective information security measures are dependent on users' willingness to apply available security technologies. Automation of security measures are often recommended, but not all security challenges can be solved in this way. In addition, users often bypass such measures through insecure behaviors. The purpose of this paper is to provide a systematic review of academic literature, analyzing existing research on information security behavior. The findings are synthesized to produce a theory-based perspective, indicating the dominant theoretical approaches used to date. It is found that limited research attention has been given to information security behavior in the home context. Our findings motivate for further research into information security beyond technical issues and the organizational context.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of 2016 Third International conference on advances in computing, communication and engineering, ICACCE 2016, 28-29 November 2016, Durban, South Africa |
| Editors | Vishal Kumar, Upasana Gitanjali Singh, S D Sudarsan |
| Publisher | IEEE |
| Pages | 225-231 |
| Number of pages | 7 |
| ISBN (Electronic) | 9781509025763, 9781509025756 |
| ISBN (Print) | 9781509025770 |
| DOIs | |
| Publication status | Published - Nov 2016 |
| Externally published | Yes |
| Event | 3rd International Conference on Advances in Computing, Communication and Engineering - Durban, South Africa Duration: 28 Nov 2016 → 29 Nov 2016 Conference number: 3rd |
Conference
| Conference | 3rd International Conference on Advances in Computing, Communication and Engineering |
|---|---|
| Abbreviated title | ICACCE 2016 |
| Country/Territory | South Africa |
| City | Durban |
| Period | 28/11/16 → 29/11/16 |
Keywords
- Behavioral information security
- Behavioral theories
- Organizational context
- Home context